Let me know if you think I got anything wrong. If you were one of the people 
whose names I missed, by all means let me know. If you want to discuss anything 
that was said, do *not* reply to this message, but use a new thread.

--Paul Hoffman

IPsecME WG
IETF 83, Paris
Monday, March 26, 2012

Minutes taken by Paul Hoffman
Text from the slides is not reproduced here
        See https://datatracker.ietf.org/meeting/83/materials.html#wg-ipsecme

Agenda was bashed, no additional issues
WG status
        Last IETF was just an informal meeting
        One current doc: P2P VPN use cases and requirements doc
        We know that protocols are already out there, but that doesn't matter 
now

P2P VPN problem statement doc
        Steve Hanna
        draft-ietf-ipsecme-p2p-vpn-problem-00
        Need a new name for the protocol
        Current draft is use cases only, will get to requirements soon
        # 210
                Postponed until after we have all the requirements
        # 211
                Add some new text about why this is difficult
                Will know more when we do the requirements
        # 212
                Give examples of why gateway-to-gateway might be useful
                Two branch offices, videoconferencing
                Paul Hoffman: this is why we postponed 210
                        People were thinking that the topic was only 
individual-to-individual
                        Naming issue started restricting what we were talking 
about
        # 213
                Need to mention challenges in use cases section
                Paul: reminded that there will be a separate requirement section
        # 214
                Core gateway configuring is a solution, so premature
                Also in #213
        # 215
                Should be a requirement
                Michael Richardson: must be a requirement
                        We don't have all the tunnels pre-configured, so we 
need to deal with flowing traffic
                        You can't pre-configure because of capacity issues on 
the gateway
                Steve: does this need to be a use case because it is so 
fundamental?
                David Black: VoIP isn't the only traffic on the Internet
                        Is OK with dropping a packet sometimes
                Tero Kivinen: This will be needed after you notice that you 
need it, when packets are flowing
                Steve: Mention in use cases that packet loss is highly 
undesirable, but add it more in the requirements
                Brian Weiss: Nervous about talking too much about voice
                (?): Not saying that no packets should be lost, but (?)
                Michael: Voice packets also being late is bad
                        Might have a policy to only use this for media, not for 
regular data
        # 216
                Solution-specific or requirement
                Tero: Is there a use case where the end point moves from 
outside the gateway to inside
                Paul: Mobility is a use case, but not just for multiple 
interfaces
                Steve: Either a new use case, or within the existing ones
        # 217
                Requirement: it's a "how", not a use case
                David: Authorization is out of scope
        # 218
                Explain that this doesn't scale in 3.1.
                Tero: It is also proprietary and can't be interoperable
                Brian: We can push out configs if needed
                Paul: Remember the massive failure of the IPS WG
                        Also issue with NATs if the endpoint hasn't talked first
        # 219
                People don't need to use this if they don't want to
                Say this in the security considerations
                Yoav Nir:
                        Has to be a requirement that any solution can implement 
different policies
                Yaron Sheffer:
                        Agrees with Yoav, maybe becomes a use case
                        Take this to the list
        # 220
                Deleted paragraph
        # 221
                Add text, proprietary approaches don't always implement all of 
the IPsec architecture
        Paul: wants a name that is properly descriptive, maybe also creative
        Next steps
                Steve will issue new I-D with new name
                Spend April writing requirements
                Then ask people to propose solutions
                Yaron: Requirements go in this draft in a different section
                Paul: Wants to see "the right amount" of interaction on this 
document
                        We have no idea if existing solutions will meet 
requirements because the requirements section is blank
                        May have some proposed solutions befor Vancouver

More raw public keys
        Tero
        draft-kivinen-ipsecme-oob-pubkey-00.txt
        Similar to what is happening TLS WG
        If we adopt this, what do we do with the old format?
        Michael: Should say, don't be silent
        Yaron: Needs to be Standards Track
        Paul: We need to discuss this on the mailing list even if it is not a 
WG document
        Brian: The document doesn't describe the encoding of the keys
                Paul: It comes from PKIX SubjectPublicKeyInfo definition

ERP for IKEv2
        Yoav
        draft-nir-ipsecme-erx
        Minor change to protocol so that you don't have to renegotiate when you 
move around
        Doesn't deal with multiple AAA domains
        Will be on the list

IANA Issue in IKEv1 ipsec-registry
        Tero
        Everything is a mess
        Will ask on the list, silence means that he can go ahead

Use of config payload for 3GPP and Femtocell
        Tricci So
        draft-so-ipsecme-ikev2-cpext-01
        Femto is on many technologies, not just 3GPP
        Fixed wireline operator needs to apply a policy to the Femto device
                Need to know the location of the Fembto AP, based on IP address
        Reuses Config payload to let SG pass back the address
        Tero: This is the completely wrong way to do this
                It's not config information, and it can't be trusted
                Maybe use an SNMP MIB instead
        (?): Also thought this is the wrong thing to do
        Paul: Not clear the process is, but it should be discussed more on the 
mailing list

_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to